Skip to content

Commit 608b45c

Browse files
authored
Merge pull request #190308 from MicrosoftDocs/main
3/02 AM Publish
2 parents 75dba9e + 1c92db7 commit 608b45c

File tree

68 files changed

+710
-333
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

68 files changed

+710
-333
lines changed

articles/active-directory-b2c/multi-factor-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,7 @@ In Azure AD B2C, you can delete a user's TOTP authenticator app enrollment. Then
122122
1. In the left menu, select **Users**.
123123
1. Search for and select the user for which you want to delete TOTP authenticator app enrollment.
124124
1. In the left menu, select **Authentication methods**.
125-
1. Under **Usable authentication methods**, find **Software OATH token (Preview)**, and then select the 3-dot menu next to it. If you don't see this interface, select **Switch to the new user authentication methods experience! Click here to use it now** to switch to the new authentication methods experience.
125+
1. Under **Usable authentication methods**, find **Software OATH token (Preview)**, and then select the ellipsis menu next to it. If you don't see this interface, select the option to **"Switch to the new user authentication methods experience! Click here to use it now"** to switch to the new authentication methods experience.
126126
1. Select **Delete**, and then select **Yes** to confirm.
127127

128128
:::image type="content" source="media/multi-factor-authentication/authentication-methods.png" alt-text="User authentication methods":::
@@ -137,4 +137,4 @@ Learn how to [delete a user's Software OATH token authentication method](/graph/
137137

138138
- Learn about the [TOTP display control](display-control-time-based-one-time-password.md) and [Azure AD MFA technical profile](multi-factor-auth-technical-profile.md)
139139

140-
::: zone-end
140+
::: zone-end

articles/active-directory-b2c/partner-bindid.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ You should now see BindID as a new OIDC Identity provider listed within your B2C
120120

121121
2. Select **New user flow**
122122

123-
3. Select **Sign up and sign in** > **Version** **Reccomended** > **Create**.
123+
3. Select **Sign up and sign in** > **Version Recommended** > **Create**.
124124

125125
4. Enter a **Name** for your policy.
126126

articles/active-directory/fundamentals/whats-new.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -159,6 +159,7 @@ You can now automate creating, updating, and deleting user accounts for these ne
159159
- [Gong](../saas-apps/gong-provisioning-tutorial.md)
160160
- [LanSchool Air](../saas-apps/lanschool-air-provisioning-tutorial.md)
161161
- [ProdPad](../saas-apps/prodpad-provisioning-tutorial.md)
162+
162163
For more information about how to better secure your organization by using automated user account provisioning, see [Automate user provisioning to SaaS applications with Azure AD](../app-provisioning/user-provisioning.md).
163164

164165

Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
---
2+
title: Azure Active Directory recommendation - Integrate third party apps with Azure AD | Microsoft Docs
3+
description: Learn why you should integrate third party apps with Azure AD
4+
services: active-directory
5+
documentationcenter: ''
6+
author: MarkusVi
7+
manager: karenhoran
8+
editor: ''
9+
10+
ms.assetid: 9b88958d-94a2-4f4b-a18c-616f0617a24e
11+
ms.service: active-directory
12+
ms.topic: reference
13+
ms.tgt_pltfrm: na
14+
ms.workload: identity
15+
ms.subservice: report-monitor
16+
ms.date: 03/02/2022
17+
ms.author: markvi
18+
ms.reviewer: hafowler
19+
20+
ms.collection: M365-identity-device-management
21+
---
22+
23+
# Azure AD recommendation: Integrate your third party apps
24+
25+
[Azure AD recommendations](overview-recommendations.md) is a feature that provides you with personalized insights and actionable guidance to align your tenant with recommended best practices.
26+
27+
This article covers the recommendation to integrate third party apps.
28+
29+
30+
## Description
31+
32+
As an Azure AD admin responsible for managing applications, you want to use the Azure AD security features with your third party apps. Integrating these apps into Azure AD enables:
33+
34+
- You to use one unified method to manage access to your third party apps.
35+
- Your users to benefit from using single sign-on to access all your apps with a single password.
36+
37+
38+
## Logic
39+
40+
If Azure AD determines that none of your users are using Azure AD to authenticate to your third party apps, this recommendation shows up.
41+
42+
## Value
43+
44+
Integrating third party apps with Azure AD allows you to use Azure AD's security features.
45+
The integration:
46+
- Improves the productivity of your users.
47+
48+
- Lowers your app management cost.
49+
50+
You can then add an extra security layer by using conditional access to control how your users can access your apps.
51+
52+
## Action plan
53+
54+
1. Review the configuration of your apps.
55+
2. For each app that isn't integrated into Azure AD yet, verify whether an integration is possible.
56+
57+
58+
## Next steps
59+
60+
- [Tutorials for integrating SaaS applications with Azure Active Directory](../saas-apps/tutorial-list.md)
61+
- [Azure AD reports overview](overview-reports.md)

articles/active-directory/reports-monitoring/toc.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -114,3 +114,7 @@
114114
href: reports-faq.yml
115115
- name: Sign-in log schema
116116
href: reference-azure-monitor-sign-ins-log-schema.md
117+
- name: Recommendations
118+
items:
119+
- name: Integrate your third party apps
120+
href: recommendation-integrate-third-party-apps.md

articles/active-directory/verifiable-credentials/how-to-dnsbind.md

Lines changed: 51 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: karenhoran
77
ms.service: active-directory
88
ms.topic: how-to
99
ms.subservice: verifiable-credentials
10-
ms.date: 04/01/2021
10+
ms.date: 02/22/2022
1111
ms.author: barclayn
1212

1313
#Customer intent: Why are we doing this?
@@ -17,15 +17,9 @@ ms.author: barclayn
1717

1818
> [!IMPORTANT]
1919
> Azure Active Directory Verifiable Credentials is currently in public preview.
20-
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
20+
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
2121
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
2222
23-
In this article:
24-
> [!div class="checklist"]
25-
> * Why do we need to link our DID to our domain?
26-
> * How do we link DIDs and domains?
27-
> * How does the domain linking process work?
28-
> * How does the verify/unverified domain logic work?
2923

3024
## Prerequisites
3125

@@ -35,16 +29,20 @@ To link your DID to your domain, you need to have completed the following.
3529

3630
## Why do we need to link our DID to our domain?
3731

38-
A DID starts out as an identifier that is not anchored to existing systems. A DID is useful because a user or organization can own it and control it. If an entity interacting with the organization does not know 'who' the DID belongs to, then the DID is not as useful.
32+
A DID starts out as an identifier that isn't anchored to existing systems. A DID is useful because a user or organization can own it and control it. If an entity interacting with the organization doesn't know 'who' the DID belongs to, then the DID isn't as useful.
3933

4034
Linking a DID to a domain solves the initial trust problem by allowing any entity to cryptographically verify the relationship between a DID and a Domain.
4135

36+
## When do you need to update the domain in your DID?
37+
38+
In the event where the domain associated with your company changes, you would also need to change the domain in your DID document that is also published in the ION network. You can update the domain in your DID directly from the Azure AD Verifiable Credential portal.
39+
4240
## How do we link DIDs and domains?
4341

44-
We make a link between a domain and a DID by implementing an open standard written by the Decentralized Identity Foundation called [Well-Known DID configuration](https://identity.foundation/.well-known/resources/did-configuration/). The verifiable credentials service in Azure Active Directory (Azure AD) helps your organization make the link between the DID and domain by including the domain information that you provided in your DID, and generating the well-known config file:
42+
We follow the [Well-Known DID configuration](https://identity.foundation/.well-known/resources/did-configuration/) specification when creating the link. The verifiable credentials service links your DID and domain. The service includes the domain information that you provided in your DID, and generates the well-known config file:
4543

4644
1. Azure AD uses the domain information you provide during organization setup to write a Service Endpoint within the DID Document. All parties who interact with your DID can see the domain your DID proclaims to be associated with.
47-
45+
4846
```json
4947
"service": [
5048
{
@@ -71,25 +69,25 @@ We make a link between a domain and a DID by implementing an open standard writt
7169
}
7270
```
7371

74-
After you have the well-known configuration file, you need to make the file available using the domain name you specified when enabling your AAD for verifiable credentials.
72+
After you have the well-known configuration file, you need to make the file available using the domain name you specified when you enabled your Azure AD for verifiable credentials.
7573

76-
* Host the well-known DID configuration file at the root of the domain.
77-
* Do not use redirects.
78-
* Use https to distribute the configuration file.
74+
- Host the well-known DID configuration file at the root of the domain.
75+
- Don't use redirects.
76+
- Use https to distribute the configuration file.
7977

8078
>[!IMPORTANT]
8179
>Microsoft Authenticator does not honor redirects, the URL specified must be the final destination URL.
8280

83-
## User experience
81+
## User experience in the wallet
8482

85-
When a user is going through an issuance flow or presenting a verifiable credential, they should know something about organization and its DID. If the domain our verifiable credential wallet, Microsoft Authenticator, validates a DID's relationship with the domain in the DID document and presents users with two different experiences depending on the outcome.
83+
When a user is going through an issuance flow or presenting a verifiable credential, they should know something about the organization and its DID. Microsoft Authenticator, validates a DID's relationship with the domain in the DID document and presents users with two different experiences depending on the outcome.
8684

8785
## Verified domain
8886

8987
Before Microsoft Authenticator displays a **Verified** icon, a few things need to be true:
9088

9189
* The DID signing the self-issued open ID (SIOP) request must have a Service endpoint for Linked Domain.
92-
* The root domain does not use a redirect and uses https.
90+
* The root domain doesn't use a redirect and uses https.
9391
* The domain listed in the DID Document has a resolvable well-known resource.
9492
* The well-known resource's verifiable credential is signed with the same DID that was used to sign the SIOP that Microsoft Authenticator used to kick start the flow.
9593

@@ -99,19 +97,47 @@ If all of the previously mentioned are true, then Microsoft Authenticator displa
9997

10098
## Unverified domain
10199

102-
If any of the above are not true, the Microsoft Authenticator will display a full page warning to the user that the domain is unverified, the user is in the middle of a risky transaction and they should proceed with caution. We have chosen to take this route because:
100+
If any of the above aren't true, Microsoft Authenticator displays a full page warning to the user indicating that the domain is unverified. The user is warned that they are in the middle of a potential risky transaction and they should proceed with caution. We have chosen to take this route because:
103101

104102
* The DID is either not anchored to a domain.
105-
* The configuration was not set up properly.
106-
* The DID the user is interacting with is malicious and actually can't prove they own a domain (since they actually don't). Due to this last point, it is imperative that you link your DID to the domain the user is familiar with, to avoid propagating the warning message.
103+
* The configuration wasn't set up properly.
104+
* The DID that the user is interacting with could be malicious and actually can't prove that they own the domain linked.
105+
106+
It is of high importance that you link your DID to a domain recognizable to the user.
107107

108108
![unverified domain warning in the add credential screen](media/how-to-dnsbind/add-credential-not-verified-authenticated.png)
109109

110-
## Distribute well-known config
110+
## How do you update the linked domain on your DID?
111+
112+
1. Navigate to the Verifiable Credentials | Getting Started page.
113+
1. On the left side of the page select **Domain**.
114+
1. In the Domain box, enter your new domain name.
115+
1. Select **Publish**.
116+
117+
:::image type="content" source="media/how-to-dnsbind/publish-update-domain.png" alt-text="Choose the publish button so your changes become":::
118+
119+
It might take up to two hours for your DID document to be updated in the [ION network](https://identity.foundation/ion) with the new domain information. No other changes to the domain are possible before the changes are published.
120+
121+
>[!NOTE]
122+
>If your changes are successful you will need to [verify](#verified-domain) your newly added domain.
111123

112-
1. Navigate to the Settings page in Verifiable Credentials and choose **Verify this domain**
113124

114-
![Verify this domain in settings](media/how-to-dnsbind/settings-verify.png)
125+
:::image type="content" source="media/how-to-dnsbind/verification.png" alt-text="You need to verify your domain once that the publishing process completes":::
126+
127+
### Do I need to wait for my DID Doc to be updated to verify my newly added domains?
128+
129+
Yes. You need to wait until the config.json file gets updated before you publish it using your domain's hosting location.
130+
131+
### How do I know when the linked domain update has successfully completed?
132+
133+
Once the domain changes are publised to ION, the domain section inside the Azure AD Verifiable Credentials service will display `Published` as the status and you should be able to make new changes to the domain.
134+
135+
>[!IMPORTANT]
136+
> No changes to your domain are possible while publishing is in progress.
137+
138+
## Distribute well-known config
139+
140+
1. From the Azure portal, navigate to the Verifiable Credentials page. Select **Domain** and choose **Verify this domain**
115141

116142
2. Download the did-configuration.json file shown in the image below.
117143

@@ -132,4 +158,4 @@ Congratulations, you now have bootstrapped the web of trust with your DID!
132158

133159
## Next steps
134160

135-
If during onboarding you enter the wrong domain information or if you decide to change it, you will need to [opt out](how-to-opt-out.md). At this time, we don't support updating your DID document. Opting out and opting back in will create a brand new DID.
161+
- [How to customize your Azure Active Directory Verifiable Credentials](credential-design.md)
88.9 KB
Loading
55.8 KB
Loading

0 commit comments

Comments
 (0)